Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers

被引:27
作者
Alasmary, Hisham [1 ,2 ]
Abusnaina, Ahmed [1 ]
Jang, Rhongho [1 ]
Abuhamad, Mohammed [1 ]
Anwar, Afsah [1 ]
Nyang, DaeHun [3 ]
Mohaisen, David [1 ]
机构
[1] Univ Cent Florida, Orlando, FL 32816 USA
[2] King Khalid Univ, Abha, Saudi Arabia
[3] Ewha Womans Univ, Seoul, South Korea
来源
2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS) | 2020年
关键词
Internet of Things; Adversarial Machine Learning; Malware Detection; Deep Learning;
D O I
10.1109/ICDCS47774.2020.00089
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Deep learning algorithms have been widely used for security applications, including malware detection and classification. Recent results have shown that those algorithms are vulnerable to adversarial examples, whereby a small perturbation in the input sample may result in misclassification. In this paper, we systematically tackle the problem of adversarial examples detection in the control flow graph (CFG) based classifiers for malware detection using Soteria. Unique to Soteria, we use both density-based and level-based labels for CFG labeling to yield a consistent representation, a random walk-based traversal approach for feature extraction, and n-gram based module for feature representation. End-to-end, Soteria's representation ensures a simple yet powerful randomization property of the used classification features, making it difficult even for a powerful adversary to launch a successful attack. Soteria also employs a deep learning approach, consisting of an auto-encoder for detecting adversarial examples, and a CNN architecture for detecting and classifying malware samples. We evaluate the performance of Soteria, using a large dataset consisting of 16,814 IoT samples, and demonstrate its superiority in comparison with state-of-the-art approaches. In particular, Soteria yields an accuracy rate of 97.79% for detecting AEs, and 99.91% overall accuracy for classification malware families.
引用
收藏
页码:888 / 898
页数:11
相关论文
共 40 条
[1]   Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems [J].
Abusnaina, Ahmed ;
Khormali, Aminollah ;
Alasmary, Hisham ;
Park, Jeman ;
Anwar, Afsah ;
Mohaisen, Aziz .
2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019), 2019, :1296-1305
[2]   A framework for metamorphic malware analysis and real-time detection [J].
Alam, Shahid ;
Horspool, R. Nigel ;
Traore, Issa ;
Sogukpinar, Ibrahim .
COMPUTERS & SECURITY, 2015, 48 :212-233
[3]   Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach [J].
Alasmary, Hisham ;
Khormali, Aminollah ;
Anwar, Afsah ;
Park, Jeman ;
Choi, Jinchun ;
Abusnaina, Ahmed ;
Awad, Amro ;
Nyang, Daehun ;
Mohaisen, Aziz .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8977-8988
[4]  
[Anonymous], 2017, 5 INT C LEARN REPR I
[5]  
[Anonymous], 2015, INT C LEARN REPR
[6]  
[Anonymous], 2017, 5 INT C LEARNING REP
[7]  
[Anonymous], 2019, DEVELOPERS
[8]  
Antonakakis M., 2012, 21 USENIX SEC S USEN, P491
[9]  
Bruschi D, 2006, LECT NOTES COMPUT SC, V4064, P129
[10]   Towards Evaluating the Robustness of Neural Networks [J].
Carlini, Nicholas ;
Wagner, David .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :39-57